Input Technologies Aimed at Ease-of-Use

Smith, Brad
March 2005
Wireless Week;3/15/2005, Vol. 11 Issue 7, p56
Trade Publication
Deals with several predictive text and sensory-based technology. Features of the VibeTonz technology from Immersion Corp.; View of XJ Wan, analyst with the Yankee Group, on the use of biometrics; Reason wireless carriers prefer using fingerprint recognition for M-commerce applications; Information on the Tegic Mobile Suite.


Related Articles

  • Apple's Touch ID Payments: A Farce or A Force for Change? Wolfe, Daniel // ISO & Agent Weekly;9/18/2014, Vol. 10 Issue 34, p19 

    The author asserts that computer manufacturer Apple uses security as a selling point for its Apple Pay mobile payment system wherein it incorporates its smartphone's Touch ID fingerprint scanner to authorize a payment. He mentions Apple Pay's use of tokenization, and the effect of data breaches...

  • UP FRONT.  // U.S. Black Engineer & Information Technology;Feb/Mar2006, Vol. 29 Issue 5, p10 

    The article introduces three information technology products. The Blackberry 7100 Series handset resembles the cell phone in size and combines wireless phone, email and data transfer. The TuneStage is a transmitter using Bluetooth technology that connects to high-end home stereos. The Palm...

  • EVENTS CALENDAR.  // Telecom Asia;Aug2009, Vol. 20 Issue 7, p32 

    A calendar of international events related to the telecommunication industry from August 27 to December 16, 2009 is presented which includes the Mobile Payment World Asia in Singapore, the CTIA Wireless IT & Entertainment 2009 in San Diego, California, and the ICT Expo 2009 in Jakarta, Indonesia.

  • Biometric access control.  // Architectural Record;May2005, Vol. 193 Issue 5, p348 

    The article reports that Marks USA introduces its IQue biometric fingerprint lockset. The combination of the stand-alone IQue lockset with a biometric fingerprint reader with Radio Frequency (RF) transmission offers security access that can not be lost, stolen, or duplicated to verify a person's...

  • SECURING A BIOMETRIC TRAIT: A CASE STUDY ON FINGER PRINTS. CHAUHAN, MADHU; SAXENA, R. P. // International Journal of Research in Commerce, IT & Management;Sep2013, Vol. 3 Issue 9, p40 

    Today's inevitable need is getting the correct information within specified time frame. For satisfying our requirement, it is very important to make the information secured from being damaged or tempered by any unauthorized user. There are many upcoming techniques in the field of information...

  • Singularity Points Detection in Fingerprint Images. Chaudhari, Jitendra P.; Patil, Pradeep M.; Kosta, Y. P. // International Journal of Computer Applications;May2012, Vol. 45, p30 

    An efficient algorithm for singular points (core and delta) detection in fingerprint images is proposed. The algorithm is based on an efficient maximum variation in local orientation field calculation method. The method was tested with FVC-2000 fingerprint database and the results were compared...

  • Feeling A Little Insecure?  // Industry Week/IW;Jan2007, Vol. 256 Issue 1, p36 

    The article reports on the increase in the number of information security professionals employed worldwide in 2006 according to an IDC survey of global companies and public sector organizations. The greatest increase occurred in the Asia Pacific region with 10.6%. A 5.7% increase was realized in...

  • A Secured Authentication System for MANETs using Voice and Fingerprint Biometrics. Shanthini, B.; Swamynathan, S. // European Journal of Scientific Research;9/13/2011, Vol. 59 Issue 4, p533 

    Mobile Ad hoc NETworks (MANET) are collections of wireless mobile devices with restricted broadcast range and resources and communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. MANET is a self...

  • Development of Mechanism of Integrity in M-Commerce Using Joint Signature Scheme. Shafiq, Sobia; Khiyal, Malik Sikandar Hayat; Khan, Aihab // International Journal of Computer Theory & Engineering;Jun2012, Vol. 4 Issue 3, p332 

    This research focuses on providing integrity in mobile transactions. The main contribution for this paper is to develop mechanism which can provide integrity in mobile payment methods by using joint signature scheme, as it uses fewer resources. Different hash functions and time stamping is used...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics